Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    164s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 20:45

General

  • Target

    03898b462c7e29a415cdd67c4a4bced4.exe

  • Size

    755KB

  • MD5

    03898b462c7e29a415cdd67c4a4bced4

  • SHA1

    9f4e817867c4d753e418a2cb84b04c773f4560a8

  • SHA256

    bdeb1037e795b667e1b0f0b0136a34a7c0d5fab25c5d5935b182dd8886cd10d5

  • SHA512

    c905a4c7d48eeb27a4da37271865f5a8e2fbfcd784c82d924e94ab559c2feae69130cee985f6a21ba4abaf4d6bbedf40a0524e92a1eef04d4f916b96f10c91aa

  • SSDEEP

    12288:ypq6C/2OGAtkCP4cejGSOpRK3CnIiv78:yp8/2+ttPJLfpRK3CnHD8

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03898b462c7e29a415cdd67c4a4bced4.exe
    "C:\Users\Admin\AppData\Local\Temp\03898b462c7e29a415cdd67c4a4bced4.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops autorun.inf file
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4348
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C AT /delete /yes
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Windows\SysWOW64\at.exe
        AT /delete /yes
        3⤵
          PID:1452
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Users\Admin\Desktop\system3_.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1784
        • C:\Windows\SysWOW64\at.exe
          AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Users\Admin\Desktop\system3_.exe
          3⤵
            PID:2628
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /C cacls "C:\system volume information" /e /g "Admin":f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2568
          • C:\Windows\SysWOW64\cacls.exe
            cacls "C:\system volume information" /e /g "Admin":f
            3⤵
              PID:3288
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /C cacls "C:\system volume information" /e /g "Admin":f
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4812
            • C:\Windows\SysWOW64\cacls.exe
              cacls "C:\system volume information" /e /g "Admin":f
              3⤵
                PID:4652

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\Desktop\autorun.ini

            Filesize

            102B

            MD5

            948c74cd98911b420ff89dac13399bcb

            SHA1

            76dfc73518f003953923b1b4f2b973f4bb56a411

            SHA256

            94a1ac3d574425ec8a3cc01675e4d787373d2a190dddd4f8ba507c49ca3fd42a

            SHA512

            b31d82ede9d48e390a50a9dcf5c4c607c62638e8bc56f473250f9a56b7967d5de948abed69bbb2c35eb0112288faa5c438316b06ccbb36d289e93952b30e2ede

          • C:\Users\Admin\Desktop\system3_.exe

            Filesize

            755KB

            MD5

            03898b462c7e29a415cdd67c4a4bced4

            SHA1

            9f4e817867c4d753e418a2cb84b04c773f4560a8

            SHA256

            bdeb1037e795b667e1b0f0b0136a34a7c0d5fab25c5d5935b182dd8886cd10d5

            SHA512

            c905a4c7d48eeb27a4da37271865f5a8e2fbfcd784c82d924e94ab559c2feae69130cee985f6a21ba4abaf4d6bbedf40a0524e92a1eef04d4f916b96f10c91aa

          • memory/4348-0-0x0000000000400000-0x00000000004D5000-memory.dmp

            Filesize

            852KB